Catalogue

Record Details

Catalogue Search


Back To Results
Showing Item 5 of 478
Preferred library: Mackenzie Public Library?

Zero day exploit : countdown to darkness  Cover Image E-book E-book

Zero day exploit : countdown to darkness

Shein, Rob. (Author). Sachs, Marcus H. (Added Author).

Summary: The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community.

Record details

  • ISBN: 0080543928
  • ISBN: 9780080543925
  • ISBN: 9781931836098
  • ISBN: 1931836094
  • ISBN: 9781932266764
  • ISBN: 1932266763
  • Physical Description: 1 online resource.
    remote
  • Publisher: Rockland, MA : Syngress, ©2004.

Content descriptions

General Note:
"Rob Shein aka Rogue Shoten."
Title from e-book title screen (viewed Sept. 1, 2004).
"Foreword by David Litchfield."--E-book 'cover' page.
Formatted Contents Note: Front Cover; Zero Day Exploit; Copyright Page; Contents; Foreword; Chapter 1. Prologue; Chapter 2. DefCon in Las Vegas, 2000; Chapter 3. The DoJ Project, Washington DC, 2001; Chapter 4. The Arrival of MadFast; Chapter 5. ZFon Vulnerability; Chapter 6. Scanning the System, 2003; Chapter 7. Zero Day; Chapter 8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security
Restrictions on Access Note:
NLC staff and students only.
Subject: Computer security -- Fiction
Hackers -- Fiction
Computer networks -- Security measures -- Fiction
Genre: Electronic books.
Electronic books.
Fiction.
Fiction.

Back To Results
Showing Item 5 of 478
Preferred library: Mackenzie Public Library?

Additional Resources